• Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
View Item 
  •   DSpace Home
  • 1- Fakülteler | Faculties
  • Fen Edebiyat Fakültesi / Faculty of Arts and Sciences
  • Enformasyon Teknolojileri Bölümü / Department of Information Technologies
  • FEF - Makale Koleksiyonu | Enformasyon Teknolojileri Bölümü / Department of Information Technologies
  • View Item
  •   DSpace Home
  • 1- Fakülteler | Faculties
  • Fen Edebiyat Fakültesi / Faculty of Arts and Sciences
  • Enformasyon Teknolojileri Bölümü / Department of Information Technologies
  • FEF - Makale Koleksiyonu | Enformasyon Teknolojileri Bölümü / Department of Information Technologies
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

SIMSec: A key exchange protocol between SIM card and service provider

Thumbnail

View/Open

Publisher's Version (934.7Kb)

Date

2016-08-01

Author

Ok, Kerem
Coşkun, Vedat
Yarman, Bekir Sıddık Binboğa
Çevikbaş, Cem
Özdenizci Köse, Büşra

Metadata

Show full item record

Citation

Ok, K., Coşkun, V., Yarman, B. S. B., Çevikbaş, C. & Özdenizci Köse, B. (2016). SIMSec: A key exchange protocol between SIM card and service provider. Wireless Personal Communications, 89(4), 1371-1390. doi:10.1007/s11277-016-3326-5

Abstract

Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication between the Subscriber Identity Module (SIM) cards on Smartphones and the servers of SP. The latest SIM cards comply with recent specifications including secure domain generation, mobile signatures, pre-installed encryption keys, and other useful security services. Nevertheless, un-keyed SIM cards do not satisfy such requirements, thus end-to-end encryption between the SIM card and SP cannot be provided. In this paper, we provide a key exchange protocol, which creates a symmetric key through the collaborative work of the SIM card and the SP server. After a successful protocol performance, the SIM card and SP can perform end-to-end data encryption. After defining the protocol, we also discuss the security issues and provide a formal security analysis of the protocol using the Casper/FDR tool.

Source

Wireless Personal Communications

Volume

89

Issue

4

URI

https://hdl.handle.net/11729/864
http://dx.doi.org/10.1007/s11277-016-3326-5

Collections

  • FEF - Makale Koleksiyonu | Enformasyon Teknolojileri Bölümü / Department of Information Technologies [67]
  • Scopus İndeksli Makale Koleksiyonu [792]
  • WoS İndeksli Makale Koleksiyonu [810]



DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
Theme by 
@mire NV
 

 




| Policy | Guide | Contact |

DSpace@Işık

by OpenAIRE
Advanced Search

sherpa/romeo

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeLanguageDepartmentCategoryPublisherAccess TypeIşık AuthorCitationThis CollectionBy Issue DateAuthorsTitlesSubjectsTypeLanguageDepartmentCategoryPublisherAccess TypeIşık AuthorCitation

My Account

LoginRegister

Statistics

View Google Analytics Statistics

DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
Theme by 
@mire NV
 

 


|| Policy || Guide || Library || Işık University || OAI-PMH ||

Işık University Library, Şile, İstanbul, Turkey
If you find any errors in content please report us

Creative Commons License
Işık University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..

DSpace@Işık:


DSpace 6.2

tarafından İdeal DSpace hizmetleri çerçevesinde özelleştirilerek kurulmuştur.